General
-
Target
c812c24d7a79a942f76236f5eba64c484de8a55d91f9dee7396f18a5bf95c5e2.zip
-
Size
482KB
-
Sample
230208-lyafqshe8x
-
MD5
f18a85b3caad2e224aedeb3d1c379ca7
-
SHA1
39cd003909ded8c8d4ea4377a453190d91d022b3
-
SHA256
6efd97ced03da1e033b15b481e7133689824dfe8f964c598d4a4ce784de7add3
-
SHA512
dbb9fe594dab6c9c0ec24cc86399f542d92114e44e185979424f9db5d19e3f5f25d25688d1dd732b7b3a148a22de3a31f90c59e97569b02bdf1e00e4ea9f64e6
-
SSDEEP
6144:2aWZltn9RoDSNhb9gTnad4zz4+D+N1Ud4QTNiRHqe/9qDwWC8RsQT7D1U6:WZ0AeLBzz1XTk79ew4se/
Static task
static1
Behavioral task
behavioral1
Sample
c812c24d7a79a942f76236f5eba64c484de8a55d91f9dee7396f18a5bf95c5e2.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c812c24d7a79a942f76236f5eba64c484de8a55d91f9dee7396f18a5bf95c5e2.exe
Resource
win10v2004-20220812-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.unitechautomations.com - Port:
587 - Username:
[email protected] - Password:
Unitech@123 - Email To:
[email protected]
Targets
-
-
Target
c812c24d7a79a942f76236f5eba64c484de8a55d91f9dee7396f18a5bf95c5e2.exe
-
Size
708KB
-
MD5
dd80116107948b21cd05010aec0349e9
-
SHA1
eee69181c1f472a3c8dc8ab6cd61fa48a07a9e78
-
SHA256
c812c24d7a79a942f76236f5eba64c484de8a55d91f9dee7396f18a5bf95c5e2
-
SHA512
878682f2938a9916489a7d20e5dbf84272c37a5edc02aaa6c5db563c6acf72117dfebf81ced5d5d22c57257adb41c34b5b5814a5b18b11c2699d40301948dc4c
-
SSDEEP
12288:rVeqshUgUDne7f4WYMTyPdLX2tuCAe/ZX01Uu5eABI1pcOH2pX8g28rSwECvmhGn:pGI7MTyPdLX2tuCAe/ZX9JH2pTS9Cvqd
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Accesses Microsoft Outlook profiles
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-